Feeds

Buyer's Guide: 15in Notebooks

How to select the machine that's right for you

High performance access to file storage

Ram, bam, thank you, ma'am

Integrated graphics chips will take some of the main memory, so don't worry that the extra gigabyte in a 4GB, Windows 7 Home Premium 32-bit system will be wasted - it won't. Discrete graphics chips come with their own Ram.

So 3GB is the minimum for an integrated system, and 4GB is a sensible purchase. Some high end laptops already ship with 8GB of Ram, but a lot of that really will be wasted if you don't also have a 64-bit OS.

Lenovo ThinkPad Edge

15.6in notebooks are not the acme of portability

Hard drive storage is cheap and plentiful - get as much as you can afford. Unfortunately, we're unlikely to see budget solid-state drives any time soon. Although the hardware is absolutely wonderful, the price is still very high. But these machines use Sata-standard HDDs, so swapping them for SSDs is generally straightforward.

Wireless communication is an essential feature for a laptop and every model here supports 802.11n Wi-Fi which is faster than the older 802.11g though you'll need an 802.11n-capable router to get the benefit. You may wish to pay extra for Bluetooth if you need to link to your mobile phone or some other peripheral.

A 15.6in notebook will weigh around 2.5kg - a lot to lug around if you want to take your machine with you wherever you go. You can buy 13in laptops with the same 1366 x 768 resolution that weigh a more convenient 2kg, and 11.6in or 12in laptops will generally offer the same resolution and be lighter still. The key point to note here: it's the screen's resolutio that governs how much content you can cram on it, not its physical size.

A fair few 15.6in notebooks come with higher resolutions than 1366 x 768, with 1920 x 1080 - the same as a 1080i or 1080p TV - the most commonplace. Again, you'll pay more for those extra good-for-HD-video-and-games pixels. ®

High performance access to file storage

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.